CAPEC-675

Retrieve Data from Decommissioned Devices
MEDIUM
MEDIUM
Stable
2021-06-24 00:00 +00:00
2023-01-24 00:00 +00:00

Alerte pour un CAPEC

Stay informed of any changes for a specific CAPEC.
Alert management

Description

An adversary obtains decommissioned, recycled, or discarded systems and devices that can include an organization’s intellectual property, employee data, and other types of controlled information. Systems and devices that have reached the end of their lifecycles may be subject to recycle or disposal where they can be exposed to adversarial attempts to retrieve information from internal memory chips and storage devices that are part of the system.

Informations

Prerequisites

An adversary needs to have access to electronic data processing equipment being recycled or disposed of (e.g., laptops, servers) at a collection location and the ability to take control of it for the purpose of exploiting its content.

Skills Required

An adversary may need the ability to mount printed circuit boards and target individual chips for exploitation.
An adversary needs the technical skills required to extract solid state drives, hard disk drives, and other storage media to host on a compatible system or harness to gain access to digital content.

Mitigations

Backup device data before erasure to retain intellectual property and inside knowledge.
Overwrite data on device rather than deleting. Deleted data can still be recovered, even if the device trash can is emptied. Rewriting data removes any trace of the old data. Performing multiple overwrites followed by a zeroing of the device (overwriting with all zeros) is good practice.
Use a secure erase software.
Physically destroy the device if it is not intended to be reused. Using a specialized service to disintegrate, burn, melt or pulverize the device can be effective, but if those services are inaccessible, drilling nails or holes, or smashing the device with a hammer can be effective. Do not burn, microwave, or pour acid on a hard drive.
Physically destroy memory and SIM cards for mobile devices not intended to be reused.
Ensure that the user account has been terminated or switched to a new device before destroying.

Related Weaknesses

CWE-ID Weakness Name
CWE-1266 Improper Scrubbing of Sensitive Data from Decommissioned Device
The product does not properly provide a capability for the product administrator to remove sensitive data at the time the product is decommissioned. A scrubbing capability could be missing, insufficient, or incorrect.

References

REF-663

NIST Special Publication 800-88 Revision 1: Guidelines for Media Sanitization
Richard Kissel, Andrew Regenscheid, Matthew Scholl, Kevin Stine.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf

REF-717

Disposing of Devices Safely
Linda Pesante, Christopher King, George Silowash.
https://www.cisa.gov/uscert/sites/default/files/publications/DisposeDevicesSafely.pdf

Submission

Name Organization Date Date Release
CAPEC Content Team The MITRE Corporation 2021-06-24 +00:00

Modifications

Name Organization Date Comment
CAPEC Content Team The MITRE Corporation 2022-02-22 +00:00 Updated Mitigations, References
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Taxonomy_Mappings
CAPEC Content Team The MITRE Corporation 2023-01-24 +00:00 Updated Related_Weaknesses
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.